Signature verification involves vague situations in which a signature could resemble many reference samples ormight differ because of handwriting variances. By presenting the features and similarity score of signature...Signature verification involves vague situations in which a signature could resemble many reference samples ormight differ because of handwriting variances. By presenting the features and similarity score of signatures from thematching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy,a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertaintiesand ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values,which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1neutrosophic representation is also unable to adjust to various degrees of uncertainty. The proposed work exploresthe type-2 neutrosophic logic to enable additional flexibility and granularity in handling ambiguity, indeterminacy,and uncertainty, hence improving the accuracy of signature verification systems. Because type-2 neutrosophiclogic allows the assessment of many sources of ambiguity and conflicting information, decision-making is moreflexible. These experimental results show the possible benefits of using a type-2 neutrosophic engine for signatureverification by demonstrating its superior handling of uncertainty and variability over type-1, which eventuallyresults in more accurate False Rejection Rate (FRR) and False Acceptance Rate (FAR) verification results. In acomparison analysis using a benchmark dataset of handwritten signatures, the type-2 neutrosophic similaritymeasure yields a better accuracy rate of 98% than the type-1 95%.展开更多
Deep learning(DL)models have been useful in many computer vision,speech recognition,and natural language processing tasks in recent years.These models seem a natural fit to handle the rising number of biometric recogn...Deep learning(DL)models have been useful in many computer vision,speech recognition,and natural language processing tasks in recent years.These models seem a natural fit to handle the rising number of biometric recognition problems,from cellphone authentication to airport security systems.DL approaches have recently been utilized to improve the efficiency of various biometric recognition systems.Iris recognition was considered the more reliable and accurate biometric detection method accessible.Iris recognition has been an active research region in the last few decades due to its extensive applications,from security in airports to homeland security border control.This article presents a new Political Optimizer with Deep Transfer Learning Enabled Biometric Iris Recognition(PODTL-BIR)model.The presented PODTL-BIR technique recognizes the iris for biometric security.In the presented PODTL-BIR model,an initial stage of pre-processing is carried out.In addition,the MobileNetv2 feature extractor is utilized to produce a collection of feature vectors.The PODTL-BIR technique utilizes a bidirectional gated recurrent unit(BiGRU)model to recognise iris for biometric verification.Finally,the political optimizer(PO)algorithm is used as a hyperparameter tuning strategy to improve the PODTL-BIR technique’s recognition efficiency.Awide-ranging experimental investigation was executed to validate the enhanced performance of the PODTL-BIR system.The experimental outcome stated the promising performance of the PODTL-BIR system over other existing algorithms.展开更多
The measurement,reporting,and verification(MRV) of climate finance was originated from discussions under the United Nations Framework Convention on Climate Change(UNFCCC).It has been one of the key issues of global cl...The measurement,reporting,and verification(MRV) of climate finance was originated from discussions under the United Nations Framework Convention on Climate Change(UNFCCC).It has been one of the key issues of global climate negotiations since 2009 and will continue to be of significant importance in addressing climate change and strengthening international trust.This paper analyses the concept,the objective,and the progress of the MRV of climate finance based on reviews of the latest literature and think-tank reports regarding climate finance regime and MRV.Following the analysis,challenges faced with the MRV of climate finance are illustrated.This paper presents that the comparability of climate finance data needs to be improved due to the variety of methodologies used for disaggregating climate finance.In addition,the integrality of the MRV system of climate finance has been impaired by the lack of feedback mechanism from the recipients to the contributors in reporting system.Furthermore,although accounting system of climate finance has been developing and improving,it remains incapacity in providing accurate data on disbursed climate finance.Responding to the above challenges,this paper proposes the key tasks in establishing a comprehensive MRV system for climate finance at international level.The tasks involve developing a measurement system with consistent data basis and accounting basis,a reporting system with more detailed guidance and standardized formats,as well as a verification mechanism balancing top-down and bottom-up review processes.In the last section,this paper concludes that the establishment of an improved MRV of climate finance requires concerted cooperation and negotiations between developed and developing country Parties under the UNFCCC.As one of the few developing country donors to the Global Environmental Facility(GEF),China is suggested to clarify its propositions as a developing country in aspects such as concept,coverage,and architecture of climate finance and MRV system,and gain bargaining power in improving operating and technical rules of international climate finance regime.展开更多
Identity verification using authenticity evaluation of handwritten signatures is an important issue.There have been several approaches for the verification of signatures using dynamics of the signing process.Most of t...Identity verification using authenticity evaluation of handwritten signatures is an important issue.There have been several approaches for the verification of signatures using dynamics of the signing process.Most of these approaches extract only global characteristics.With the aim of capturing both dynamic global and local features,this paper introduces a novel model for verifying handwritten dynamic signatures using neutrosophic rule-based verification system(NRVS)and Genetic NRVS(GNRVS)models.The neutrosophic Logic is structured to reflect multiple types of knowledge and relations among all features using three values:truth,indeterminacy,and falsity.These three values are determined by neutrosophic membership functions.The proposed model also is able to deal with all features without the need to select from them.In the GNRVS model,the neutrosophic rules are automatically chosen by Genetic Algorithms.The performance of the proposed system is tested on the MCYT-Signature-100 dataset.In terms of the accuracy,average error rate,false acceptance rate,and false rejection rate,the experimental results indicate that the proposed model has a significant advantage compared to different well-known models.展开更多
As location-based techniques and applications have become ubiquitous in emerging wireless networks, the verification of location information has become more important. In recent years, there has been an explosion of a...As location-based techniques and applications have become ubiquitous in emerging wireless networks, the verification of location information has become more important. In recent years, there has been an explosion of activity related to lo- cation-verification techniques in wireless networks. In particular, there has been a specific focus on intelligent transport systems because of the mission-critical nature of vehicle location verification. In this paper, we review recent research on wireless location verification related to vehicular networks. We focus on location verification systems that rely on for- mal mathematical classification frameworks and show how many systems are either partially or fully encompassed by such frameworks.展开更多
This paper presents an off-line handwritten signature verification system based on the Siamese network,where a hybrid architecture is used.The Residual neural Network(ResNet)is used to realize a powerful feature extra...This paper presents an off-line handwritten signature verification system based on the Siamese network,where a hybrid architecture is used.The Residual neural Network(ResNet)is used to realize a powerful feature extraction model such that Writer Independent(WI)features can be effectively learned.A single-layer Siamese Neural Network(NN)is used to realize a Writer Dependent(WD)classifier such that the storage space can be minimized.For the purpose of reducing the impact of the high intraclass variability of the signature and ensuring that the Siamese network can learn more effectively,we propose a method of selecting a reference signature as one of the inputs for the Siamese network.To take full advantage of the reference signature,we modify the conventional contrastive loss function to enhance the accuracy.By using the proposed techniques,the accuracy of the system can be increased by 5.9%.Based on the GPDS signature dataset,the proposed system is able to achieve an accuracy of 94.61%which is better than the accuracy achieved by the current state-of-the-art work.展开更多
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d...In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the digital twin communication system implementation is completely correct.Formal verification is currently recognized as a method to ensure the correctness of software system for communication in digital twins because it uses rigorous mathematical methods to verify the correctness of systems for communication in digital twins and can effectively help system designers determine whether the system is designed and implemented correctly.In this paper,we use the interactive theorem proving tool Isabelle/HOL to construct the formal model of the X86 architecture,and to model the related assembly instructions.The verification result shows that the system states obtained after the operations of relevant assembly instructions is consistent with the expected states,indicating that the system meets the design expectations.展开更多
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems...Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.展开更多
Objective:To apply and verify the application of intelligent audit rules for urine analysis by Cui et al.Method:A total of 1139 urine samples of hospitalized patients in Tai’an Central Hospital from September 2021 to...Objective:To apply and verify the application of intelligent audit rules for urine analysis by Cui et al.Method:A total of 1139 urine samples of hospitalized patients in Tai’an Central Hospital from September 2021 to November 2021 were randomly selected,and all samples were manually microscopic examined after the detection of the UN9000 urine analysis line.The intelligent audit rules(including the microscopic review rules and manual verification rules)were validated based on the manual microscopic examination and manual audit,and the rules were adjusted to apply to our laboratory.The laboratory turnaround time(TAT)before and after the application of intelligent audit rules was compared.Result:The microscopic review rate of intelligent rules was 25.63%(292/1139),the true positive rate,false positive rate,true negative rate,and false negative rate were 27.66%(315/1139),6.49%(74/1139),62.34%(710/1139)and 3.51%(40/1139),respectively.The approval consistency rate of manual verification rules was 84.92%(727/856),the approval inconsistency rate was 0%(0/856),the interception consistency rate was 12.61%(108/856),and the interception inconsistency rate was 0%(0/856).Conclusion:The intelligence audit rules for urine analysis by Cui et al.have good clinical applicability in our laboratory.展开更多
A secure operating system in the communication network can provide the stable working environment,which ensures that the user information is not stolen.The micro-kernel operating system in the communication network re...A secure operating system in the communication network can provide the stable working environment,which ensures that the user information is not stolen.The micro-kernel operating system in the communication network retains the core functions in the kernel,and unnecessary tasks are implemented by calling external processes.Due to the small amount of code,the micro-kernel architecture has high reliability and scalability.Taking the microkernel operating system in the communication network prototype VSOS as an example,we employ the objdump tool to disassemble the system source code and get the assembly layer code.On this basis,we apply the Isabelle/HOL,a formal verification tool,to model the system prototype.By referring to the mathematical model of finite automata and taking the process scheduling module as an example,the security verification based on the assembly language layer is developed.Based on the Hoare logic theory,each assembly statement of the module is verified in turn.The verification results show that the scheduling module of VSOS has good functional security,and also show the feasibility of the refinement framework.展开更多
The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules...The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules can be translated into machine language and used by autonomous vehicles.In this paper,a translation flow is designed.Beyond the translation,a deeper examination is required,because the semantics of natural languages are rich and complex,and frequently contain hidden assumptions.The issue of how to ensure that digital rules are accurate and consistent with the original intent of the traffic rules they represent is both significant and unresolved.In response,we propose a method of formal verification that combines equivalence verification with model checking.Reasonable and reassuring digital traffic rules can be obtained by utilizing the proposed traffic rule digitization flow and verification method.In addition,we offer a number of simulation applications that employ digital traffic rules to assess vehicle violations.The experimental findings indicate that our digital rules utilizing metric temporal logic(MTL)can be easily incorporated into simulation platforms and autonomous driving systems(ADS).展开更多
The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more ...The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more privacy security challenges,the most commom which is privacy leakage.As a privacy protection technology combining data integrity check and identity anonymity,ring signature is widely used in the field of privacy protection.However,introducing signature technology leads to additional signature verification overhead.In the scenario of crowd-sensing,the existing signature schemes have low efficiency in multi-signature verification.Therefore,it is necessary to design an efficient multi-signature verification scheme while ensuring security.In this paper,a batch-verifiable signature scheme is proposed based on the crowd-sensing background,which supports the sensing platform to verify the uploaded multiple signature data efficiently,so as to overcoming the defects of the traditional signature scheme in multi-signature verification.In our proposal,a method for linking homologous data was presented,which was valuable for incentive mechanism and data analysis.Simulation results showed that the proposed scheme has good performance in terms of security and efficiency in crowd-sensing applications with a large number of users and data.展开更多
To address the current problems of poor generality,low real-time,and imperfect information transmission of the battlefield target intelligence system,this paper studies the battlefield target intelligence system from ...To address the current problems of poor generality,low real-time,and imperfect information transmission of the battlefield target intelligence system,this paper studies the battlefield target intelligence system from the top-level perspective of multi-service joint warfare.First,an overall planning and analysis method of architecture modeling is proposed with the idea of a bionic analogy for battlefield target intelligence system architecture modeling,which reduces the difficulty of the planning and design process.The method introduces the Department of Defense architecture framework(DoDAF)modeling method,the multi-living agent(MLA)theory modeling method,and other combinations for planning and modeling.A set of rapid planning methods that can be applied to model the architecture of various types of complex systems is formed.Further,the liveness analysis of the battlefield target intelligence system is carried out,and the problems of the existing system are presented from several aspects.And the technical prediction of the development and construction is given,which provides directional ideas for the subsequent research and development of the battlefield target intelligence system.In the end,the proposed architecture model of the battlefield target intelligence system is simulated and verified by applying the colored Petri nets(CPN)simulation software.The analysis demonstrates the reasonable integrity of its logic.展开更多
Recent advancements in satellite technologies and the declining cost of access to space have led to the emergence of large satellite constellations in Low Earth Orbit(LEO).However,these constellations often rely on be...Recent advancements in satellite technologies and the declining cost of access to space have led to the emergence of large satellite constellations in Low Earth Orbit(LEO).However,these constellations often rely on bent-pipe architecture,resulting in high communication costs.Existing onboard inference architectures suffer from limitations in terms of low accuracy and inflexibility in the deployment and management of in-orbit applications.To address these challenges,we propose a cloud-native-based satellite design specifically tailored for Earth Observation tasks,enabling diverse computing paradigms.In this work,we present a case study of a satellite-ground collaborative inference system deployed in the Tiansuan constellation,demonstrating a remarkable 50%accuracy improvement and a substantial 90%data reduction.Our work sheds light on in-orbit energy,where in-orbit computing accounts for 17%of the total onboard energy consumption.Our approach represents a significant advancement of cloud-native satellite,aiming to enhance the accuracy of in-orbit computing while simultaneously reducing communication cost.展开更多
Online Signature Verification (OSV), as a personal identification technology, is widely used in various industries.However, it faces challenges, such as incomplete feature extraction, low accuracy, and computational h...Online Signature Verification (OSV), as a personal identification technology, is widely used in various industries.However, it faces challenges, such as incomplete feature extraction, low accuracy, and computational heaviness. Toaddress these issues, we propose a novel approach for online signature verification, using a one-dimensionalGhost-ACmix Residual Network (1D-ACGRNet), which is a Ghost-ACmix Residual Network that combines convolutionwith a self-attention mechanism and performs improvement by using Ghost method. The Ghost-ACmix Residualstructure is introduced to leverage both self-attention and convolution mechanisms for capturing global featureinformation and extracting local information, effectively complementing whole and local signature features andmitigating the problem of insufficient feature extraction. Then, the Ghost-based Convolution and Self-Attention(ACG) block is proposed to simplify the common parts between convolution and self-attention using the Ghostmodule and employ feature transformation to obtain intermediate features, thus reducing computational costs.Additionally, feature selection is performed using the random forestmethod, and the data is dimensionally reducedusing Principal Component Analysis (PCA). Finally, tests are implemented on the MCYT-100 datasets and theSVC-2004 Task2 datasets, and the equal error rates (EERs) for small-sample training using five genuine andforged signatures are 3.07% and 4.17%, respectively. The EERs for training with ten genuine and forged signaturesare 0.91% and 2.12% on the respective datasets. The experimental results illustrate that the proposed approacheffectively enhances the accuracy of online signature verification.展开更多
Background:The purpose of the study was to investigate the active ingredients and potential biochemical mechanisms of Juanbi capsule in knee osteoarthritis based on network pharmacology,molecular docking and animal ex...Background:The purpose of the study was to investigate the active ingredients and potential biochemical mechanisms of Juanbi capsule in knee osteoarthritis based on network pharmacology,molecular docking and animal experiments.Methods:Chemical components for each drug in the Juanbi capsule were obtained from Traditional Chinese Medicine Systems Pharmacology Database and Analysis Platform,while the target proteins for knee osteoarthritis were retrieved from the Drugbank,GeneCards,and OMIM databases.The study compared information on knee osteoarthritis and the targets of drugs to identify common elements.The data was imported into the STRING platform to generate a protein-protein interaction network diagram.Subsequently,a“component-target”network diagram was created using the screened drug components and target information with Cytoscape software.Common targets were imported into Metascape for GO function and KEGG pathway enrichment analysis.AutoDockTools was utilized to predict the molecular docking of the primary chemical components and core targets.Ultimately,the key targets were validated through animal experiments.Results:Juanbi capsule ameliorated Knee osteoarthritis mainly by affecting tumor necrosis factor,interleukin1β,MMP9,PTGS2,VEGFA,TP53,and other cytokines through quercetin,kaempferol,andβ-sitosterol.The drug also influenced the AGE-RAGE,interleukin-17,tumor necrosis factor,Relaxin,and NF-κB signaling pathways.The network pharmacology analysis results were further validated in animal experiments.The results indicated that Juanbi capsule could decrease the levels of tumor necrosis factor-αand interleukin-1βin the serum and synovial fluid of knee osteoarthritis rats and also down-regulate the expression levels of MMP9 and PTGS2 proteins in the articular cartilage.Conclusion:Juanbi capsule may improve the knee bone microstructure and reduce the expression of inflammatory factors of knee osteoarthritis via multiple targets and multiple signaling pathways.展开更多
In conjunction with the working characteristics of the high-clearance wheeled sprayer and the benefits of the closed hydraulic system,a series of reasonable working parameters should be established,and a hydraulic sys...In conjunction with the working characteristics of the high-clearance wheeled sprayer and the benefits of the closed hydraulic system,a series of reasonable working parameters should be established,and a hydraulic system that fulfills the requisite specifications should be designed.The AMESim software model is employed to construct a closed hydraulic transmission system,and the simulation analysis is then performed according to the data of hydraulic components.According to analysis results,the prototype can be optimized and upgraded,and a verification test is further carried out.The test results demonstrate that the designed closed hydraulic transmission system meets the actual working requirements of the high-clearance wheeled sprayer and provides a stable experimental platform for intelligent control of agricultural machinery.展开更多
Dynamic signature is a biometric modality that recognizes an individual’s anatomic and behavioural characteristics when signing their name. The rampant case of signature falsification (Identity Theft) was the key mot...Dynamic signature is a biometric modality that recognizes an individual’s anatomic and behavioural characteristics when signing their name. The rampant case of signature falsification (Identity Theft) was the key motivating factor for embarking on this study. This study was necessitated by the damages and dangers posed by signature forgery coupled with the intractable nature of the problem. The aim and objectives of this study is to design a proactive and responsive system that could compare two signature samples and detect the correct signature against the forged one. Dynamic Signature verification is an important biometric technique that aims to detect whether a given signature is genuine or forged. In this research work, Convolutional Neural Networks (CNNsor ConvNet) which is a class of deep, feed forward artificial neural networks that has successfully been applied to analysing visual imagery was used to train the model. The signature images are stored in a file directory structure which the Keras Python library can work with. Then the CNN was implemented in python using the Keras with the TensorFlow backend to learn the patterns associated with the signature. The result showed that for the same CNNs-based network experimental result of average accuracy, the larger the training dataset, the higher the test accuracy. However, when the training dataset are insufficient, better results can be obtained. The paper concluded that by training datasets using CNNs network, 98% accuracy in the result was recorded, in the experimental part, the model achieved a high degree of accuracy in the classification of the biometric parameters used.展开更多
Objective:To construct a risk prediction model for fall in patients with maintenance hemodialysis(MHD)and to verify the prediction effect of the model.Methods:From June 2020 to December 2020,307 patients who underwent...Objective:To construct a risk prediction model for fall in patients with maintenance hemodialysis(MHD)and to verify the prediction effect of the model.Methods:From June 2020 to December 2020,307 patients who underwent MHD in a tertiary hospital in Chengdu were divided into a fall group(32 cases)and a non-fall group(275 cases).Logistic regression analysis model was used to establish the influencing factors of the subjects.Hosmer–Lemeshow and receiver operating characteristic(ROC)curve were used to test the goodness of fit and predictive effect of the model,and 104 patients were again included in the application research of the model.Results:The risk factors for fall were history of falls in the past year(OR=3.951),dialysis-related hypotension(OR=6.949),time up and go(TUG)test(OR=4.630),serum albumin(OR=0.661),frailty(OR=7.770),and fasting blood glucose(OR=1.141).Hosmer–Lemeshow test was P=0.475;the area under the ROC curve was 0.907;the Youden index was 0.642;the sensitivity was 0.843;and the specificity was 0.799.Conclusions:The risk prediction model constructed in this study has a good effect and can provide references for clinical screening of fall risks in patients with MHD.展开更多
Abstract: The major methods to investigate the airbags cushion system are experimental method, thermodynamic method and finite element method (FEM). Airbags cushion systems are very complicated and very difficult t...Abstract: The major methods to investigate the airbags cushion system are experimental method, thermodynamic method and finite element method (FEM). Airbags cushion systems are very complicated and very difficult to be investigated thoroughly by such methods For experimental method, it is nearly impossible to completely analyze and optimize the cushion characteristics of airbags of airborne vehicle because of charge issue, safety concern and time constraint. Thermodynamic method fails to take the non-linear effects of large airbag deformation and varied contact conditions into consideration. For finite element method, the FE model is usually complicated and the calculation takes tens of hours of CPU time. As a result, the optimization of the design based on a nonlinear model is very difficult by traditional iterative approach method. In this paper, a model based on FEM and control volume method is proposed to simulate landing cushion process of airborne vehicle with airbags cushion system in order to analyze and optimize the parameters in airbags cushion system. At first, the performance of airbags cushion system model is verified experimentally. In airdrop test, accelerometers are fixed in 4 test points distributed over engine mount, top, bottom and side armor plate of hull to obtain acceleration curves with time. The simulation results are obtained under the same conditions of the airdrop test and the simulation results agree very well with the experimental results, which indicate the established model is valid for further optimization. To optimize the parameters of airbags, equivalent response model based on Latin Hypercube DOE and radial basis function is employed instead of the complex finite element model. Then the optimal results based on equivalent response model are obtained using simulated annealing algorithm. After optimization, the maximal acceleration of airborne vehicle landing reduces 19.83%, while the energy absorption by airbags increases 7.85%. The performance of the airbags cushion system thus is largely improved through optimization, which indicates the proposed method has the capability of solving the parameter optimization problem of airbags cushion system for airborne vehicle.展开更多
文摘Signature verification involves vague situations in which a signature could resemble many reference samples ormight differ because of handwriting variances. By presenting the features and similarity score of signatures from thematching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy,a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertaintiesand ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values,which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1neutrosophic representation is also unable to adjust to various degrees of uncertainty. The proposed work exploresthe type-2 neutrosophic logic to enable additional flexibility and granularity in handling ambiguity, indeterminacy,and uncertainty, hence improving the accuracy of signature verification systems. Because type-2 neutrosophiclogic allows the assessment of many sources of ambiguity and conflicting information, decision-making is moreflexible. These experimental results show the possible benefits of using a type-2 neutrosophic engine for signatureverification by demonstrating its superior handling of uncertainty and variability over type-1, which eventuallyresults in more accurate False Rejection Rate (FRR) and False Acceptance Rate (FAR) verification results. In acomparison analysis using a benchmark dataset of handwritten signatures, the type-2 neutrosophic similaritymeasure yields a better accuracy rate of 98% than the type-1 95%.
基金The Deanship of Scientific Research(DSR)at King Abdulaziz University(KAU),Jeddah,Saudi Arabia has funded this project,under grant no.KEP-3-120-42.
文摘Deep learning(DL)models have been useful in many computer vision,speech recognition,and natural language processing tasks in recent years.These models seem a natural fit to handle the rising number of biometric recognition problems,from cellphone authentication to airport security systems.DL approaches have recently been utilized to improve the efficiency of various biometric recognition systems.Iris recognition was considered the more reliable and accurate biometric detection method accessible.Iris recognition has been an active research region in the last few decades due to its extensive applications,from security in airports to homeland security border control.This article presents a new Political Optimizer with Deep Transfer Learning Enabled Biometric Iris Recognition(PODTL-BIR)model.The presented PODTL-BIR technique recognizes the iris for biometric security.In the presented PODTL-BIR model,an initial stage of pre-processing is carried out.In addition,the MobileNetv2 feature extractor is utilized to produce a collection of feature vectors.The PODTL-BIR technique utilizes a bidirectional gated recurrent unit(BiGRU)model to recognise iris for biometric verification.Finally,the political optimizer(PO)algorithm is used as a hyperparameter tuning strategy to improve the PODTL-BIR technique’s recognition efficiency.Awide-ranging experimental investigation was executed to validate the enhanced performance of the PODTL-BIR system.The experimental outcome stated the promising performance of the PODTL-BIR system over other existing algorithms.
基金supported by the National Natural Science Foundation of China project "The joint mechanism and macro-regulation mechanism for national emission trading market of China"[Grant Number:71503288]the Research Base Project of Beijing Philosophy and Social Science Foundation "Payments for Ecosystem Services Mechanism that Supports The Synergetic Development of Ecological Protection in Beijing-Tianjin-Hebei Region"[Grant Number:16JDYJC039]the project "Environmental Risk Management for Corporate Lending in China's Commercial Banks" sponsored by the Scientific Research Foundation for the returned overseas Chinese scholars,State Education Ministry
文摘The measurement,reporting,and verification(MRV) of climate finance was originated from discussions under the United Nations Framework Convention on Climate Change(UNFCCC).It has been one of the key issues of global climate negotiations since 2009 and will continue to be of significant importance in addressing climate change and strengthening international trust.This paper analyses the concept,the objective,and the progress of the MRV of climate finance based on reviews of the latest literature and think-tank reports regarding climate finance regime and MRV.Following the analysis,challenges faced with the MRV of climate finance are illustrated.This paper presents that the comparability of climate finance data needs to be improved due to the variety of methodologies used for disaggregating climate finance.In addition,the integrality of the MRV system of climate finance has been impaired by the lack of feedback mechanism from the recipients to the contributors in reporting system.Furthermore,although accounting system of climate finance has been developing and improving,it remains incapacity in providing accurate data on disbursed climate finance.Responding to the above challenges,this paper proposes the key tasks in establishing a comprehensive MRV system for climate finance at international level.The tasks involve developing a measurement system with consistent data basis and accounting basis,a reporting system with more detailed guidance and standardized formats,as well as a verification mechanism balancing top-down and bottom-up review processes.In the last section,this paper concludes that the establishment of an improved MRV of climate finance requires concerted cooperation and negotiations between developed and developing country Parties under the UNFCCC.As one of the few developing country donors to the Global Environmental Facility(GEF),China is suggested to clarify its propositions as a developing country in aspects such as concept,coverage,and architecture of climate finance and MRV system,and gain bargaining power in improving operating and technical rules of international climate finance regime.
文摘Identity verification using authenticity evaluation of handwritten signatures is an important issue.There have been several approaches for the verification of signatures using dynamics of the signing process.Most of these approaches extract only global characteristics.With the aim of capturing both dynamic global and local features,this paper introduces a novel model for verifying handwritten dynamic signatures using neutrosophic rule-based verification system(NRVS)and Genetic NRVS(GNRVS)models.The neutrosophic Logic is structured to reflect multiple types of knowledge and relations among all features using three values:truth,indeterminacy,and falsity.These three values are determined by neutrosophic membership functions.The proposed model also is able to deal with all features without the need to select from them.In the GNRVS model,the neutrosophic rules are automatically chosen by Genetic Algorithms.The performance of the proposed system is tested on the MCYT-Signature-100 dataset.In terms of the accuracy,average error rate,false acceptance rate,and false rejection rate,the experimental results indicate that the proposed model has a significant advantage compared to different well-known models.
基金supported by the University of New South Wales and the Australian Research Council under grant No.DP120102607
文摘As location-based techniques and applications have become ubiquitous in emerging wireless networks, the verification of location information has become more important. In recent years, there has been an explosion of activity related to lo- cation-verification techniques in wireless networks. In particular, there has been a specific focus on intelligent transport systems because of the mission-critical nature of vehicle location verification. In this paper, we review recent research on wireless location verification related to vehicular networks. We focus on location verification systems that rely on for- mal mathematical classification frameworks and show how many systems are either partially or fully encompassed by such frameworks.
文摘This paper presents an off-line handwritten signature verification system based on the Siamese network,where a hybrid architecture is used.The Residual neural Network(ResNet)is used to realize a powerful feature extraction model such that Writer Independent(WI)features can be effectively learned.A single-layer Siamese Neural Network(NN)is used to realize a Writer Dependent(WD)classifier such that the storage space can be minimized.For the purpose of reducing the impact of the high intraclass variability of the signature and ensuring that the Siamese network can learn more effectively,we propose a method of selecting a reference signature as one of the inputs for the Siamese network.To take full advantage of the reference signature,we modify the conventional contrastive loss function to enhance the accuracy.By using the proposed techniques,the accuracy of the system can be increased by 5.9%.Based on the GPDS signature dataset,the proposed system is able to achieve an accuracy of 94.61%which is better than the accuracy achieved by the current state-of-the-art work.
基金supported in part by the Natural Science Foundation of Jiangsu Province in China under grant No.BK20191475the fifth phase of“333 Project”scientific research funding project of Jiangsu Province in China under grant No.BRA2020306the Qing Lan Project of Jiangsu Province in China under grant No.2019.
文摘In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the digital twin communication system implementation is completely correct.Formal verification is currently recognized as a method to ensure the correctness of software system for communication in digital twins because it uses rigorous mathematical methods to verify the correctness of systems for communication in digital twins and can effectively help system designers determine whether the system is designed and implemented correctly.In this paper,we use the interactive theorem proving tool Isabelle/HOL to construct the formal model of the X86 architecture,and to model the related assembly instructions.The verification result shows that the system states obtained after the operations of relevant assembly instructions is consistent with the expected states,indicating that the system meets the design expectations.
基金funded by the National Natural Science Foundation of China(62072056,62172058)the Researchers Supporting Project Number(RSP2023R102)King Saud University,Riyadh,Saudi Arabia+4 种基金funded by the Hunan Provincial Key Research and Development Program(2022SK2107,2022GK2019)the Natural Science Foundation of Hunan Province(2023JJ30054)the Foundation of State Key Laboratory of Public Big Data(PBD2021-15)the Young Doctor Innovation Program of Zhejiang Shuren University(2019QC30)Postgraduate Scientific Research Innovation Project of Hunan Province(CX20220940,CX20220941).
文摘Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.
文摘Objective:To apply and verify the application of intelligent audit rules for urine analysis by Cui et al.Method:A total of 1139 urine samples of hospitalized patients in Tai’an Central Hospital from September 2021 to November 2021 were randomly selected,and all samples were manually microscopic examined after the detection of the UN9000 urine analysis line.The intelligent audit rules(including the microscopic review rules and manual verification rules)were validated based on the manual microscopic examination and manual audit,and the rules were adjusted to apply to our laboratory.The laboratory turnaround time(TAT)before and after the application of intelligent audit rules was compared.Result:The microscopic review rate of intelligent rules was 25.63%(292/1139),the true positive rate,false positive rate,true negative rate,and false negative rate were 27.66%(315/1139),6.49%(74/1139),62.34%(710/1139)and 3.51%(40/1139),respectively.The approval consistency rate of manual verification rules was 84.92%(727/856),the approval inconsistency rate was 0%(0/856),the interception consistency rate was 12.61%(108/856),and the interception inconsistency rate was 0%(0/856).Conclusion:The intelligence audit rules for urine analysis by Cui et al.have good clinical applicability in our laboratory.
基金This work was supported in part by the Natural Science Foundation of Jiangsu Province under grant No.BK20191475the fifth phase of“333 Project”scientific research funding project of Jiangsu Province in China under grant No.BRA2020306the Qing Lan Project of Jiangsu Province in China under grant No.2019.
文摘A secure operating system in the communication network can provide the stable working environment,which ensures that the user information is not stolen.The micro-kernel operating system in the communication network retains the core functions in the kernel,and unnecessary tasks are implemented by calling external processes.Due to the small amount of code,the micro-kernel architecture has high reliability and scalability.Taking the microkernel operating system in the communication network prototype VSOS as an example,we employ the objdump tool to disassemble the system source code and get the assembly layer code.On this basis,we apply the Isabelle/HOL,a formal verification tool,to model the system prototype.By referring to the mathematical model of finite automata and taking the process scheduling module as an example,the security verification based on the assembly language layer is developed.Based on the Hoare logic theory,each assembly statement of the module is verified in turn.The verification results show that the scheduling module of VSOS has good functional security,and also show the feasibility of the refinement framework.
文摘The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules can be translated into machine language and used by autonomous vehicles.In this paper,a translation flow is designed.Beyond the translation,a deeper examination is required,because the semantics of natural languages are rich and complex,and frequently contain hidden assumptions.The issue of how to ensure that digital rules are accurate and consistent with the original intent of the traffic rules they represent is both significant and unresolved.In response,we propose a method of formal verification that combines equivalence verification with model checking.Reasonable and reassuring digital traffic rules can be obtained by utilizing the proposed traffic rule digitization flow and verification method.In addition,we offer a number of simulation applications that employ digital traffic rules to assess vehicle violations.The experimental findings indicate that our digital rules utilizing metric temporal logic(MTL)can be easily incorporated into simulation platforms and autonomous driving systems(ADS).
基金supported by National Natural Science Foundation of China under Grant No.61972360Shandong Provincial Natural Science Foundation of China under Grant Nos.ZR2020MF148,ZR2020QF108.
文摘The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more privacy security challenges,the most commom which is privacy leakage.As a privacy protection technology combining data integrity check and identity anonymity,ring signature is widely used in the field of privacy protection.However,introducing signature technology leads to additional signature verification overhead.In the scenario of crowd-sensing,the existing signature schemes have low efficiency in multi-signature verification.Therefore,it is necessary to design an efficient multi-signature verification scheme while ensuring security.In this paper,a batch-verifiable signature scheme is proposed based on the crowd-sensing background,which supports the sensing platform to verify the uploaded multiple signature data efficiently,so as to overcoming the defects of the traditional signature scheme in multi-signature verification.In our proposal,a method for linking homologous data was presented,which was valuable for incentive mechanism and data analysis.Simulation results showed that the proposed scheme has good performance in terms of security and efficiency in crowd-sensing applications with a large number of users and data.
基金supported by the National Natural Science Foundation of China(41927801).
文摘To address the current problems of poor generality,low real-time,and imperfect information transmission of the battlefield target intelligence system,this paper studies the battlefield target intelligence system from the top-level perspective of multi-service joint warfare.First,an overall planning and analysis method of architecture modeling is proposed with the idea of a bionic analogy for battlefield target intelligence system architecture modeling,which reduces the difficulty of the planning and design process.The method introduces the Department of Defense architecture framework(DoDAF)modeling method,the multi-living agent(MLA)theory modeling method,and other combinations for planning and modeling.A set of rapid planning methods that can be applied to model the architecture of various types of complex systems is formed.Further,the liveness analysis of the battlefield target intelligence system is carried out,and the problems of the existing system are presented from several aspects.And the technical prediction of the development and construction is given,which provides directional ideas for the subsequent research and development of the battlefield target intelligence system.In the end,the proposed architecture model of the battlefield target intelligence system is simulated and verified by applying the colored Petri nets(CPN)simulation software.The analysis demonstrates the reasonable integrity of its logic.
基金supported by National Natural Science Foundation of China(62032003).
文摘Recent advancements in satellite technologies and the declining cost of access to space have led to the emergence of large satellite constellations in Low Earth Orbit(LEO).However,these constellations often rely on bent-pipe architecture,resulting in high communication costs.Existing onboard inference architectures suffer from limitations in terms of low accuracy and inflexibility in the deployment and management of in-orbit applications.To address these challenges,we propose a cloud-native-based satellite design specifically tailored for Earth Observation tasks,enabling diverse computing paradigms.In this work,we present a case study of a satellite-ground collaborative inference system deployed in the Tiansuan constellation,demonstrating a remarkable 50%accuracy improvement and a substantial 90%data reduction.Our work sheds light on in-orbit energy,where in-orbit computing accounts for 17%of the total onboard energy consumption.Our approach represents a significant advancement of cloud-native satellite,aiming to enhance the accuracy of in-orbit computing while simultaneously reducing communication cost.
基金National Natural Science Foundation of China(Grant No.62073227)Liaoning Provincial Science and Technology Department Foundation(Grant No.2023JH2/101300212).
文摘Online Signature Verification (OSV), as a personal identification technology, is widely used in various industries.However, it faces challenges, such as incomplete feature extraction, low accuracy, and computational heaviness. Toaddress these issues, we propose a novel approach for online signature verification, using a one-dimensionalGhost-ACmix Residual Network (1D-ACGRNet), which is a Ghost-ACmix Residual Network that combines convolutionwith a self-attention mechanism and performs improvement by using Ghost method. The Ghost-ACmix Residualstructure is introduced to leverage both self-attention and convolution mechanisms for capturing global featureinformation and extracting local information, effectively complementing whole and local signature features andmitigating the problem of insufficient feature extraction. Then, the Ghost-based Convolution and Self-Attention(ACG) block is proposed to simplify the common parts between convolution and self-attention using the Ghostmodule and employ feature transformation to obtain intermediate features, thus reducing computational costs.Additionally, feature selection is performed using the random forestmethod, and the data is dimensionally reducedusing Principal Component Analysis (PCA). Finally, tests are implemented on the MCYT-100 datasets and theSVC-2004 Task2 datasets, and the equal error rates (EERs) for small-sample training using five genuine andforged signatures are 3.07% and 4.17%, respectively. The EERs for training with ten genuine and forged signaturesare 0.91% and 2.12% on the respective datasets. The experimental results illustrate that the proposed approacheffectively enhances the accuracy of online signature verification.
基金funding from the Basic Research Project of the Education Department of Shaanxi Province(21JC010,21JP035)the Young and Middle-Aged Scientific Research and Innovation Team of the Shaanxi Provincial Administration of Traditional Chinese Medicine(2022SLRHLJ001)the 2023 Central Financial Transfer Payment Local Project“Innovation and Improvement of Five Types of Hospital Preparations,Such as Roumudan Granules”.
文摘Background:The purpose of the study was to investigate the active ingredients and potential biochemical mechanisms of Juanbi capsule in knee osteoarthritis based on network pharmacology,molecular docking and animal experiments.Methods:Chemical components for each drug in the Juanbi capsule were obtained from Traditional Chinese Medicine Systems Pharmacology Database and Analysis Platform,while the target proteins for knee osteoarthritis were retrieved from the Drugbank,GeneCards,and OMIM databases.The study compared information on knee osteoarthritis and the targets of drugs to identify common elements.The data was imported into the STRING platform to generate a protein-protein interaction network diagram.Subsequently,a“component-target”network diagram was created using the screened drug components and target information with Cytoscape software.Common targets were imported into Metascape for GO function and KEGG pathway enrichment analysis.AutoDockTools was utilized to predict the molecular docking of the primary chemical components and core targets.Ultimately,the key targets were validated through animal experiments.Results:Juanbi capsule ameliorated Knee osteoarthritis mainly by affecting tumor necrosis factor,interleukin1β,MMP9,PTGS2,VEGFA,TP53,and other cytokines through quercetin,kaempferol,andβ-sitosterol.The drug also influenced the AGE-RAGE,interleukin-17,tumor necrosis factor,Relaxin,and NF-κB signaling pathways.The network pharmacology analysis results were further validated in animal experiments.The results indicated that Juanbi capsule could decrease the levels of tumor necrosis factor-αand interleukin-1βin the serum and synovial fluid of knee osteoarthritis rats and also down-regulate the expression levels of MMP9 and PTGS2 proteins in the articular cartilage.Conclusion:Juanbi capsule may improve the knee bone microstructure and reduce the expression of inflammatory factors of knee osteoarthritis via multiple targets and multiple signaling pathways.
基金Supported by 2023 Xinjiang Uygur Autonomous Region R&D and Promotion and Application of Key Technologies of CNC Sprayer for Seed Corn(2023NC010).
文摘In conjunction with the working characteristics of the high-clearance wheeled sprayer and the benefits of the closed hydraulic system,a series of reasonable working parameters should be established,and a hydraulic system that fulfills the requisite specifications should be designed.The AMESim software model is employed to construct a closed hydraulic transmission system,and the simulation analysis is then performed according to the data of hydraulic components.According to analysis results,the prototype can be optimized and upgraded,and a verification test is further carried out.The test results demonstrate that the designed closed hydraulic transmission system meets the actual working requirements of the high-clearance wheeled sprayer and provides a stable experimental platform for intelligent control of agricultural machinery.
文摘Dynamic signature is a biometric modality that recognizes an individual’s anatomic and behavioural characteristics when signing their name. The rampant case of signature falsification (Identity Theft) was the key motivating factor for embarking on this study. This study was necessitated by the damages and dangers posed by signature forgery coupled with the intractable nature of the problem. The aim and objectives of this study is to design a proactive and responsive system that could compare two signature samples and detect the correct signature against the forged one. Dynamic Signature verification is an important biometric technique that aims to detect whether a given signature is genuine or forged. In this research work, Convolutional Neural Networks (CNNsor ConvNet) which is a class of deep, feed forward artificial neural networks that has successfully been applied to analysing visual imagery was used to train the model. The signature images are stored in a file directory structure which the Keras Python library can work with. Then the CNN was implemented in python using the Keras with the TensorFlow backend to learn the patterns associated with the signature. The result showed that for the same CNNs-based network experimental result of average accuracy, the larger the training dataset, the higher the test accuracy. However, when the training dataset are insufficient, better results can be obtained. The paper concluded that by training datasets using CNNs network, 98% accuracy in the result was recorded, in the experimental part, the model achieved a high degree of accuracy in the classification of the biometric parameters used.
基金supported by Health Commission of Sichuan Province(No.19PJ194)。
文摘Objective:To construct a risk prediction model for fall in patients with maintenance hemodialysis(MHD)and to verify the prediction effect of the model.Methods:From June 2020 to December 2020,307 patients who underwent MHD in a tertiary hospital in Chengdu were divided into a fall group(32 cases)and a non-fall group(275 cases).Logistic regression analysis model was used to establish the influencing factors of the subjects.Hosmer–Lemeshow and receiver operating characteristic(ROC)curve were used to test the goodness of fit and predictive effect of the model,and 104 patients were again included in the application research of the model.Results:The risk factors for fall were history of falls in the past year(OR=3.951),dialysis-related hypotension(OR=6.949),time up and go(TUG)test(OR=4.630),serum albumin(OR=0.661),frailty(OR=7.770),and fasting blood glucose(OR=1.141).Hosmer–Lemeshow test was P=0.475;the area under the ROC curve was 0.907;the Youden index was 0.642;the sensitivity was 0.843;and the specificity was 0.799.Conclusions:The risk prediction model constructed in this study has a good effect and can provide references for clinical screening of fall risks in patients with MHD.
文摘Abstract: The major methods to investigate the airbags cushion system are experimental method, thermodynamic method and finite element method (FEM). Airbags cushion systems are very complicated and very difficult to be investigated thoroughly by such methods For experimental method, it is nearly impossible to completely analyze and optimize the cushion characteristics of airbags of airborne vehicle because of charge issue, safety concern and time constraint. Thermodynamic method fails to take the non-linear effects of large airbag deformation and varied contact conditions into consideration. For finite element method, the FE model is usually complicated and the calculation takes tens of hours of CPU time. As a result, the optimization of the design based on a nonlinear model is very difficult by traditional iterative approach method. In this paper, a model based on FEM and control volume method is proposed to simulate landing cushion process of airborne vehicle with airbags cushion system in order to analyze and optimize the parameters in airbags cushion system. At first, the performance of airbags cushion system model is verified experimentally. In airdrop test, accelerometers are fixed in 4 test points distributed over engine mount, top, bottom and side armor plate of hull to obtain acceleration curves with time. The simulation results are obtained under the same conditions of the airdrop test and the simulation results agree very well with the experimental results, which indicate the established model is valid for further optimization. To optimize the parameters of airbags, equivalent response model based on Latin Hypercube DOE and radial basis function is employed instead of the complex finite element model. Then the optimal results based on equivalent response model are obtained using simulated annealing algorithm. After optimization, the maximal acceleration of airborne vehicle landing reduces 19.83%, while the energy absorption by airbags increases 7.85%. The performance of the airbags cushion system thus is largely improved through optimization, which indicates the proposed method has the capability of solving the parameter optimization problem of airbags cushion system for airborne vehicle.